Optimising Traffic Capacity In an Age of Terabit DDoS Attacks

Optimising Traffic Capacity In an Age of Terabit DDoS Attacks [1]. The exponential growth in both hardware and software marvelling engineering crafts has opened new opportunities for both consumer and enterprise industry. On the cross roads of offered services and demand, it is crucial for business to focus in an entirely new way to look … More Optimising Traffic Capacity In an Age of Terabit DDoS Attacks

BGP Flowspec Configuration for Juniper MX

Reference to the last article for more reference is here. In this example we assume that the Arbor SP Collector Appliance is 10.100.200.10 and the specific Juniper device is 10.1.2.3 with a configured community 1234:5678 for RTBH purposes. Step1: Create a FlowSpec policy allowing Arbor SP Collector IP Address set policy-options policy-statement ARBOR_FS_POLICY from neighbor … More BGP Flowspec Configuration for Juniper MX

IPSec VPN Configuration

FACT SHEET – VPN IPSEC (Cisco based) Understanding VPN components – IPSec and encryption (data integrity) Defining a VPN Understanding the need for encryption Types of encryption VPN benefits Cheaper connections Available anywhere Heavily encrypted and secure Many to many connection The world of IPSec Authentication Data Integrity Confidentiality Anti-Replay IPSec components Negotiation protocol – … More IPSec VPN Configuration